追蹤
Amir Jalaly Bidgoly
Amir Jalaly Bidgoly
Associate Professor at Department of Computer Engineering, University of Qom
在 qom.ac.ir 的電子郵件地址已通過驗證 - 首頁
標題
引用次數
引用次數
年份
A survey on methods and challenges in EEG based authentication
AJ Bidgoly, HJ Bidgoly, Z Arezoumand
Computers & Security 93, 101788, 2020
1292020
Benchmarking reputation systems: A quantitative verification approach
AJ Bidgoly, BT Ladani
Computers in Human Behavior 57, 274-291, 2016
422016
Fake news detection on social media using a natural language inference approach
F Sadeghi, AJ Bidgoly, H Amirkhani
Multimedia Tools and Applications 81 (23), 33801-33821, 2022
322022
Fake news detection on social media using a natural language inference approach
F Sadeghi, AJ Bidgoly, H Amirkhani
Multimedia Tools and Applications, 1-21, 2022
322022
Towards a universal and privacy preserving EEG-based authentication system
AJ Bidgoly, HJ Bidgoly, Z Arezoumand
Scientific Reports 12 (1), 2531, 2022
312022
Trust modeling and verification using colored petri nets
AJ Bidgoly, BT Ladani
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
292011
Modelling and quantitative verification of reputation systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 58 (10), 2567-2582, 2015
272015
Modeling and quantitative verification of trust systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 59 (7), 1005-1027, 2016
252016
Ransomware detection using process mining and classification algorithms
A Bahrani, AJ Bidgly
2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019
192019
PDETool: A multi-formalism modeling tool for discrete-event systems based on SDES description
A Khalili, A Jalaly Bidgoly, M Abdollahi Azgomi
Applications and Theory of Petri Nets: 30th International Conference, PETRI …, 2009
192009
Quantitative verification of beta reputation system using PRISM probabilistic model checker
AJ Bidgoly, BT Ladani
2013 10th International ISC Conference on Information Security and …, 2013
182013
Android malware detection using network traffic based on sequential deep learning models
S Fallah, AJ Bidgoly
Software: Practice and Experience, 2022
162022
Recommendation system using a deep learning and graph analysis approach
M Kherad, AJ Bidgoly
Computational Intelligence 38 (5), 1859-1883, 2022
152022
Benchmarking machine learning algorithms for android malware detection
S Fallah, AJ Bidgoly
Jordanian Journal of Computers and Information Technology 5 (3), 2019
152019
A novel chaining encryption algorithm for LPWAN IoT network
AJ Bidgoly, HJ Bidgoly
IEEE Sensors Journal 19 (16), 7027-7034, 2019
152019
Multi-thread hierarchical deep model for context-aware sentiment analysis
A Keramatfar, H Amirkhani, A Jalaly Bidgoly
Journal of Information Science 49 (1), 133-144, 2023
132023
Probabilistic analysis of trust based decision making in hostile environments
AJ Bidgoly
Knowledge-Based Systems 211, 106521, 2021
112021
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net
A Mohsenzadeh, AJ Bidgoly, Y Farjami
Journal of Network and Computer Applications 154, 102533, 2020
112020
Robustness verification of soft security systems
AJ Bidgoly
Journal of Information Security and Applications 55, 102632, 2020
102020
A systematic survey on collaborator finding systems in scientific social networks
Z Roozbahani, J Rezaeenour, H Emamgholizadeh, A Jalaly Bidgoly
Knowledge and Information Systems 62, 3837-3879, 2020
102020
系統目前無法執行作業,請稍後再試。
文章 1–20